Summarize quasi-experimental research. Describe some of the most commonly used quasi-experimental designs.

24Jan 2022 by

Textbook:
Exploring ResearchNeil J. Salkind, 2017PearsonISBN.13:
978-0-134-23841-8

Majority of the essay
should be from the textbook. 2-3 additional sources can be used. Please
properly cite the textbook within the essay and other sources used. 

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Admission essay (UC BERKELEY BUSINESS STUDENT) – nursing homework essays

The essays are the principal means we have of gaining insight about each applicant and their interests and reasons for applying to the Haas Undergraduate Program. The Haas essay question was created to provoke honest, thoughtful responses to help us get to know you. In addition to content, essays are evaluated for critical thinking and writing ability, skill in organizing and presenting thoughts, and the relevance of your answer to the question posed.
All applicants are required to respond to the following essay prompt:
Forty percent of employers find it difficult to recruit employees who are adept at critical thinking, communication, and constant adaptabilityskills that are critical to future business success. Which of these 3 qualities represent an area of development for you and why? What steps are you currently taking or plan to take to develop in this area?
Your response is limited to 500 words. To avoid a session timeout, we recommend you compose your essay in a word processor using its word count feature then cut and paste your essay in this space.

Complete (or paste) your essay here.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Supply Chain Management in The Wall Street Journal Logistics Report Please READ

Supply Chain Management in The Wall Street Journal Logistics Report
Please READ the doc file first and write the min one-page assignment.
Find an article and write a synopsis of the article on a current topic using the emailed version of The Wall Street Journal Logistics Report. With this source you will need to click on the hyperlink within the article to view the original article for actual writer, title, and date.
To successfully complete this requirement, the student will include the following elements:
1. Include the article as included in the emailed version of The WSJ Logistics Report. The emailed version of The WSJ Logistics Report is the only acceptable source.
2. Write a brief synopsis of the corresponding The WSJ full article accessible through the hyperlink.
3. Explain how this event is supply chain related. Use specific supply chain terms. Also, support with outside sources for full points.
4. Give your thoughts about how it could be handled, resolved, possible implications, and/or possible solutions. Also, support with outside sources for full points.
5. List additional references properly cited within the paper.
When you use an outside source, it is to be cited and referenced using APA (Sixth edition) format.
Item will be graded only if it meets all of the following four requirements.
1. The actual paragraph regarding the article as found in the WSJ Logistics Report is included within the document.
2. Item is an event. For example, a general opinion piece is not acceptable.
3. Item is less than 28 days old at the time the assignment is due. Current event is due February 23, 2018. Source WSJ Logistics Report must be dated January 26, 2018 or after.
4. Item is properly cited within the article and referenced at the end. It is to include authors, month/day/year published, title, source publication. If from Internet, include the source address. All elements must be included.
I will upload two pdf files that explains further explains and clarifies each element of the current event.

The post Supply Chain Management in The Wall Street Journal Logistics Report
Please READ appeared first on Assignmentio.

The post Supply Chain Management in The Wall Street Journal Logistics Report
Please READ appeared first on study tools.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Why Kleptocracy is a Roadblock in combating Global corruption – nursing homework essays

Hi 

I have found almost all of the sources for this paper. You would just need  more. source that defines Kleptocracy, 1) The topic is on Global Corruption: Why Kleptocracy is a Roadblock in combating corruption 
2) The thesis: Kleptocracy affects developing county’s economic development, political affairs ( ex. hinders trade relations and foreign investments), and quality of life for citizens

3) Also talk about the role western countries ( developed countries)  play in enabling Kleptocracy/corruption in developing countries ( there is a source on this below. It is the google book!) 
4)there are 2 stories I want you to address in the paper. 1 story is about what happened in Equatorial Guinea, the other is of Malaysia missing billions ( sources are below) 

Some Sources LINK: 

2) 

3)

Other sources have been attached below. 

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Analysis of a Theme in a Short Story Write an analysis of a theme in the short s

Analysis of a Theme in a Short Story
Write an analysis of a theme in the short story: Amy Tan, “Two Kinds”
-Thesis should reflect three points (aspects of theme) that you are going to focus on in your paper. Another approach to thematic analysis is to illustrate three methods by which an author develops a theme.
– A works cited page (MLA format), in which you cite the short story.
You are to use only TWO sources for this paper the short story itself AND one peer-reviewed article from a scholarly database from the HCCS Library Databases (such as JSTOR, Academic Search Complete, or ProQuest). The article should be either a critique of the short story or a discussion of themes in the works of the writer of that short story.

The post Analysis of a Theme in a Short Story
Write an analysis of a theme in the short s appeared first on Assignmentio.

The post Analysis of a Theme in a Short Story
Write an analysis of a theme in the short s appeared first on study tools.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Businesses involved in mergers and acquisitions must exercise due diligence in e

Businesses involved in mergers and acquisitions must exercise due diligence in ensuring that the technology environment of the future organization is robust and adequately protects their information assets and intellectual property.. Such an effort requires time and open sharing to understand the physical locations, computing environment, and any gaps to address. Lack of information sharing can lead to a problematic systems integration and hamper the building of a cohesive enterprise security posture for the merged organization. 
Often the urgency of companies undergoing a merger and acquisition (M&A) impedes comprehensive due diligence, especially in cybersecurity. This creates greater challenges for the cybersecurity engineering architect, who typically leads the cybersecurity assessment effort and creates the roadmap for the new enterprise security solution for the future organization. However, the business interest and urgency in completing the merger can also represent an opportunity for CISOs to leverage additional resources and executive attention on strategic security matters.
In this project, you will create a report on system security issues during an M&A. The details of your report, which will also include an executive briefing and summary, can be found in the final step of the project.
Step 1: Conduct a Policy Gap Analysis
As you begin Step 1 of your system security report on cybersecurity for mergers and acquisitions, keep in mind that the networks of companies going through an M&A can be subject to cyberattack. As you work through this step and the others, keep these questions in mind:
Are      companies going through an M&A prone to more attacks or more focused      attacks?
If so,      what is the appropriate course of action? 
Should      the M&A activities be kept confidential?
Now, look at the existing security policies in regard to the acquisition of the media streaming company. You have to explain to the executives that before any systems are integrated, their security policies will need to be reviewed. 
Conduct a policy gap analysis to ensure the target company’s security policies follow relevant industry standards as well as local, state, and national laws and regulations. In other words, you need to make sure the new company will not inherit any statutory or regulatory noncompliance from either of the two original companies.  This step would also identify what, if any, laws and regulations the target company is subject to. If those are different from the laws and regulations the acquiring company is subject to, then this document should answer the following questions:
How      would you identify the differences?
How      would you learn about the relevant laws and regulations?
How      would you ensure compliance with those laws and regulations?
The streaming company that is being acquired has a current customer base of 150,000 users, who on average pay $14.99 in monthly fees. Based on the overall income, use PCI Standards DSS 12 requirements, and the PCI DSS Quick Reference Guide to identify a secure strategy, and operating system protections to protect the credit card data. 
Select at least two appropriate requirements from the PCI Standards DSS 12 set of requirements and explain how the controls should be implemented, how they will change the current network, and any costs associated with implementing the change.
In the next step, you will review the streaming protocols that the companies are using.
Step 2: Review Protocols for Streaming Services
After reviewing the policies from the company and the policy gap analysis, the M&A leader asks you about the protocols used by the streaming company. He wants to know if the protocols used would affect the current state of cybersecurity within the current company environment. For this section, review the protocols, explain how they work along with any known vulnerabilities, and how to secure the company from cyberattacks. Start with researching the commonly known streaming protocols and the vulnerabilities of those protocols. Some examples are the Real-Time Streaming Protocol (RTSP), Real-Time Transport Protocol (RTP) and the Real-Time Transport Control Protocol (RTCP).
Additionally, the leadership wants to know if any vulnerabilities identified would or could lead to a no-go on the M&A. 
In other words:
You      need to identify what streaming the companies are doing and the specific      technology they are leveraging. 
What      are the technical vulnerabilities associated with the protocols involved?
Have      those been mitigated? And to what extent (i.e., has the risk been reduced      to zero, reduced somewhat, shifted to a third party, etc.)?
What      residual risk to the target company’s assets and IP remain?
Would      those risks extend to the current (takeover) company after the merger?
a. Would that be bad enough to cancel the M&A?
If the      response to #5 is yes, then, what should the target company do to further      mitigate the risk? How should the takeover company mitigate the risk? 
What      are the costs associated to the target company (implementing the      appropriate mitigation)? If the takeover firm has to take additional      measures, identify those costs as well.
After assessing and reviewing the streaming protocols, move to the next step, where you will assess the infrastructure of the merged network.
Step 3: Assess the Merged Network Infrastructure
You’ve just reviewed the streaming services of the companies, and now you will assess the infrastructure of the new network. The networks of the two companies could be configured differently, or they could use the same hardware and software, or completely different hardware and software. 
The purpose of this section is to understand what tools the company is using, the benefits and shortcomings of those tools, and the gaps within the network. Explain what tactics, techniques, and procedures you would use to understand the network. You should identify firewalls, DMZ(s), other network systems, and the status of those devices.
When your assessment of the infrastructure is complete, move to the next step, where you will assess any existing policies for wireless and bring your own device (BYOD) within the companies.
Step 4: Review the Wireless and BYOD Policies
Within Project 2, you learned about and discussed wireless networks. An M&A provides an opportunity for both companies to review their wireless networks. Within your report, explain the media company’s current stance on wireless devices and BYOD. However, the company that is being acquired does not have a BYOD policy. Explain to the managers of the acquisition what needs to be done for the new company to meet the goals of the BYOD policy.
When the review of the wireless and BYOD policies is complete, move to the next step: developing a data protection plan.
Step 5: Develop a Data Protection Plan
You’ve completed the review of the wireless and BYOD policies. In this step, you will develop the recommendations portion of your report in which you will suggest additional mechanisms for data protection at different levels of the acquired company’s architecture. 
Include the benefits, implementation activities required for protection and defense measures such as full disk encryption, BitLocker, and platform identity keys. You also want to convey to your leadership the importance of system integrity and an overall trusted computing base, environment, and support. Describe what this would entail and include Trusted Platform Module (TPM) components and drivers. How are these mechanisms employed in an authentication and authorization system? Include this in the report and whether the merging company has this. 
In the next step, you will assess any risks with the supply chain of the acquired company.
Step 6: Review Supply Chain Risk
The data protection plan is ready. In this step, you will take a look at risks to the supply chain. Acquiring a new company also means inheriting the risks associated with its supply chain and those firm’s systems and technologies. Include supply chain risks and list the security measures in place to mitigate those risks. Use the NIST Special Publication 800-161 Supply Chain Risk Management Practices for Federal Information Systems and Organizations to explain the areas that need to be addressed.
After your supply chain review is complete, move to the next step, where you will create a vulnerability management program.
Step 7: Build a Vulnerability Management Program
After your supply chain review, you conduct an interview with the company’s current cybersecurity team about vulnerability management. The team members explain to you that they never scanned or had the time to build a vulnerability management program. So, you need to build one. Use NIST Special Publication 800-40 Guide to Enterprise Patch Management Technologies to develop a program to meet the missing need.
Explain to the managers how to implement this change, why it is needed, and any costs involved.
The next step is a key one that should not be overlooked — the need to educate users from both companies of the changes being made.
Step 8: Educate Users
You’ve completed your vulnerability management program, but it’s important to educate all the users of the network about the changes. During the process of acquiring a company, policies, processes, and other aspects are often updated. The last step in the process is to inform the users for the new and old company of the changes. Within your report, explain to the acquisition managers the requirements for training the workforce. 
When you’ve completed this step, move to the final section of this project, in which you will prepare and submit your final report.
Step 9: Prepare and Submit Your Report, Executive Briefing, and Executive Summary
You’re ready now for the final step, in which you will compile and deliver the Cybersecurity for a Successful Acquisition report for the company leaders to enable them to understand the required cybersecurity strategy. 
Again, keep in mind that companies undergoing an acquisition or merger are more prone to cyberattacks. The purpose of this paper is to analyze the security posture of both companies and to develop a plan to reduce the possibility of an attack. 
The assignments for this project are as follows:
Executive      briefing: This is a three- to five-slide visual presentation for business      executives and board members.
Executive      summary: This is a one-page summary at the beginning of your report.
Cybersecurity      System Security Report for Successful Acquisition: Your report should be a      minimum 12-page double-spaced Word document with citations in APA format.      The page count does not include figures, diagrams, tables or citations.
Submit all three components to the assignment folder.
Deliverables: Cybersecurity for a Successful Acquisition, Slides to Support Executive Briefing
Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.
1.1:      Organize document or presentation in a manner that promotes understanding      and meets the requirements of the assignment.
1.2:      Develop coherent paragraphs or points to be internally unified and      function as part of the whole document or presentation.
1.3:      Provide sufficient, correctly cited support that substantiates the      writer’s ideas.
1.4:      Tailor communications to the audience.
1.5:      Use sentence structure appropriate to the task, message and audience.
1.6:      Follow conventions of Standard Written English.
1.7:      Create neat and professional looking documents appropriate for the      project.
1.8:      Create clear oral messages.
2.1:      Identify and clearly explain the issue, question, or problem under      critical consideration.
2.2:      Locate and access sufficient information to investigate the issue or      problem.
2.3:      Evaluate the information in a logical and organized manner to determine      its value and relevance to the problem.
2.4:      Consider and analyze information in context to the issue or problem.
2.5:      Develop well-reasoned ideas, conclusions or decisions, checking them against      relevant criteria and benchmarks.
5.9:      Manages and administers integrated methods, enabling the organization to      identify, capture, catalog, classify, retrieve, and share intellectual      capital and information content.
7.3:      Knowledge of methods and tools used for risk management and mitigation of      risk.
8.7:      Provide theoretical basis and practical assistance for all aspects of      digital investigation and the use of computer evidence in forensics and      law enforcement.

The post Businesses involved in mergers and acquisitions must exercise due diligence in e appeared first on Assignmentio.

The post Businesses involved in mergers and acquisitions must exercise due diligence in e appeared first on study tools.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Nutrition and Disease – nursing homework essays

Nutrition plays a vital role in a person’s overall health and well-being. Not getting enough of the recommended nutrients over the long-term can lead to malnutrition which often results in disease and illness.

In a 3-page paper, written in APA format using proper spelling/grammar, address the following:

Define malnutrition and identify a specific disease that can result from it.
Perform library research about the selected disease, and explain its physiological effects on a person’s body. 
Describe the relationship between specific foods/nutrients and the disease. Use the questions below to guide your response.
Does research indicate that a lack of specific foods/nutrients increase a person’s chance of contracting the disease?
Are there specific foods/nutrients that should be avoided by an individual afflicted with the disease?
How do specific foods/nutrients work physiologically within the body to help combat the disease?
Evaluate nutritional recommendations to help combat the disease.
Cite at least 3 credible references and present the resources in APA format on the References page.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Comprehensive Health Assessment Form (50 points) Health History (5 pts total) Bi

Comprehensive Health Assessment Form
(50 points)
Health History (5 pts total)
Biographical data: (1 pts)
No name or initial required
Age: ________ Marital status: ____M _____ S _____Sep. ____Cohab.
Birth date: _____________________ Number of dependents: ___________________
Educational level: ________________________ Gender: _____F _____ M _____Other 
Occupation (current or, if retired, past): ___________________________________­­­­___
Ethnicity/nationality: _____________________ 
Source of history (who gave you the information and how reliable is that person): _______________________________________________________________________
Present health history: (4 pts)
Current medical conditions/chronic illnesses:
Current medications:
Medication/food/environmental allergies:
Past health history: (10 pts total)
Childhood illnesses: Ask about history of mumps, chickenpox, rubella, ear infections, throat infections, pertussis, and asthma.
Hospitalizations/Surgeries: Include reason for hospitalization, year, and surgical procedures.
Accidents/injuries: Include head injuries with loss of consciousness, fractures, motor vehicle accidents, burns, and severe lacerations.
Major diseases or illnesses: Include heart problems, cancer, seizures, and any significant adult illnesses.
Immunizations (dates if known): 
Tetanus _______  Diphtheria ________  Pertussis ________  Mumps ________
Rubella _______  Polio _____________  Hepatitis B ______ Influenza _______
Varicella ______  Other ____________________________________________
Recent travel/military services: Include travel within past year and recent and past military service.
Date of last examinations: 
Physical examination _________ Vision ___________ Dental ___________
Family History (Genogram) (10 points) 
Mother/Father/Siblings/Grandparents:  include age (date of birth, if known), any major health issues, and, if indicated, cause and age at death Present as a genogram.
Review of Systems (12 points total) Be sure to ask about symptoms specifically.
General health status (1 pt): Ask about fatigue, pain, unexplained fever, night sweats, weakness, problems sleeping, and unexplained changes in weight.
Integumentary (1 pt): 
Skin: Ask about change in skin color/texture, excessive bruising, itching, skin lesions, sores that do not heal, change in mole. Do you use sun screen? How much sun exposure do you experience?
Hair: Ask about changes in hair texture and recent hair loss.
Nails: Ask about changes in nail color and texture, splitting, and cracking.
HEENT (2 pts): 
Head: Ask about headaches, recent head trauma, injury or surgery, history of concussion, dizziness, and loss of consciousness.
Neck: Ask about neck stiffness, neck pain, lymph node enlargement, and swelling or mass in the neck.
Eyes: Ask about change in vision, eye injury, itching, excessive tearing, discharge, pain, floaters, halos around lights, flashing lights, light sensitivity, and difficulty reading. Do you use corrective lenses (glasses or contact lenses)?
Ears: Ask about last hearing test, changes in hearing, ear pain, drainage, vertigo, recurrent ear infections, ringing in ears, excessive wax problems, use of hearing aids.
Nose, Nasopharynx, Sinuses: Ask about nasal discharge, frequent nosebleeds, nasal obstruction, snoring, postnasal drip, sneezing, allergies, use of recreational drugs, change in smell, sinus pain, sinus infections.
Mouth/Oropharynx: Ask about sore throats, mouth sores, bleeding gums, hoarseness, change voice quality, difficulty chewing or swallowing, change in taste, dentures and bridges.
Respiratory (1 pt): 
Ask about frequent colds, pain with breathing, cough, coughing up blood, shortness of breath, wheezing, night sweats, last chest x-ray, PPD and results, and history of smoking.
Cardiovascular (1 pt.): 
Ask about chest pain, palpitations, shortness of breath, edema, coldness of extremities, color changes in hands and feet, hair loss on legs, leg pain with activity, paresthesia, sores that do not heal, and EKG and results.
Breasts (1 pt.): (Remember men have breasts too)
Ask about breast masses or lumps, pain, nipple discharge, swelling, changes in appearance, cystic breast disease, breast cancer, breast surgery, and reduction/enlargement. Do you perform BSE (when and how)? Date of last clinical breast examination, and mammograms and results.
Gastrointestinal (1 pt.): 
Ask about changes in appetite, heartburn, gastroesophageal reflux disease, pain, nausea/vomiting, vomiting blood, jaundice, change in bowel habits, diarrhea, constipation, flatus, last fecal occult blood test and colonoscopy and results.
Genitourinary (1 pt.): 
Ask about pain on urination, burning, frequency, urgency, incontinence, hesitancy, changes in urine stream, flank pain, excessive urinary volume, decreased urinary volume, nocturia, and blood in urine.
Female/male reproductive (1 pt.): 
Both: Ask about lesions, discharge, pain or masses, change in sex drive, infertility problems, history of STDs, knowledge of STD prevention, safe sex practices, and painful intercourse. Are you current involved in a sexual relationship? If yes, heterosexual, homosexual,, bisexual? Number of sexual partners in the last 3 months. Do you use birth control? If yes, method(s) used. 
Female: Ask about menarche, description of cycle, LMP, painful menses, excessive bleeding, irregular menses, bleeding between periods, last Pap test and results, painful intercourse, pregnancies, live births, miscarriages, and abortions. 
Male: Ask about prostate or scrotal problems, impotence or sterility, satisfaction with sexual performance, frequency and technique for TSE, and last prostate examination and results.
Musculoskeletal (1 pt.): 
Ask about fractures, muscle pain, weakness, joint swelling, joint pain, stiffness, limitations in mobility, back pain, loss of height, and bone density scan and results.
Neurological (1 pt.):  Ask about pain, fainting, seizures, changes in cognition, changes in memory, sensory deficits such as numbness, tingling and loss of sensation, problems with gait, balance, and coordination, tremor, and spasm.
Psychosocial Profile (10 pts)
Health practices and beliefs/self-care activities: Ask about type and frequency of exercise, type and frequency of self examination, oral hygiene practice (frequency of brushing/flossing), screening examinations (blood pressure, prostate, breast, glucose, etc.)
Nutritional patterns: Ask about daily intake (24 hour recall) and appetite.
Functional Ability: Ask if able to perform activities of daily living such as dressing, bathing, eating, toileting and instrumental activities of daily living like shopping, driving, cooking. 
Sleep/rest patterns: Ask about number of hours of sleep per night, whether sleep is restful, naps, and use of sleep aids.
Personal habits (tobacco, alcohol, caffeine, and drugs): Ask about type, amount, and years used.
Environmental history: Identify environment as urban/rural, type of home (apartment, own home, condo)
Family/social relationships: Ask about significant others, individuals in home
Cultural/religious influences: Identify any cultural and religious influences on health.
Mental Health: Ask about anxiety, depression, irritability, stressful events, and personal coping strategies.
Now answer the question below: (3 pts)
Using the instructions below, identify 1 physical strength, 1 psychosocial/cognitive strength, and 1 weakness in either category. State why you think this to be true.
With the information you collected, you can begin developing an idea of a client’s weakness and strengths. What is a strength? This might be that a person’s nutritional status appears to be excellent. It may be that there is no impairment of mobility. They may have lots of friends with them so be socially active. What is a weakness? This might be that a person does have impaired mobility or perhaps imbalanced nutrition – more than or less than body requirements. It might be that they have a communication issue that you note or perhaps seem to have a depressed mood, seem alone/isolated.

The post Comprehensive Health Assessment Form
(50 points)
Health History (5 pts total)
Bi appeared first on Assignmentio.

The post Comprehensive Health Assessment Form
(50 points)
Health History (5 pts total)
Bi appeared first on study tools.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Nursing Assessment Through Interview and Observation – nursing homework essays

Written Activity
 
 
The students will complete an assessment, through interview and observation, of an individual of your choice. Names of the person interviewed and assessed are to be anonymous.  Do not use personal names in your presentation.
 
APA format required.  
 
 
While applying the Allen McGill Nursing Model the components of assessment will include:
 
         Growth and development (age and stage of development)
 
         Past medical and social history (i.e., illnesses, surgeries, occupation, hobbies)
 
         Family situations (i.e., marital status, number of children, parents, siblings, living arrangements)
 
         Observations objective and subjective (i.e., skin, posture, mood)
 

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Nutrition and Disease – nursing homework essays

Nutrition plays a vital role in a person’s overall health and well-being. Not getting enough of the recommended nutrients over the long-term can lead to malnutrition which often results in disease and illness.

In a 3-page paper, written in APA format using proper spelling/grammar, address the following:

Define malnutrition and identify a specific disease that can result from it.
Perform library research about the selected disease, and explain its physiological effects on a person’s body. 
Describe the relationship between specific foods/nutrients and the disease. Use the questions below to guide your response.
Does research indicate that a lack of specific foods/nutrients increase a person’s chance of contracting the disease?
Are there specific foods/nutrients that should be avoided by an individual afflicted with the disease?
How do specific foods/nutrients work physiologically within the body to help combat the disease?
Evaluate nutritional recommendations to help combat the disease.
Cite at least 3 credible references and present the resources in APA format on the References page.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"